Security & Compliance
How we protect your data and ensure safe, private events.
Data Encryption
All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption. Your sensitive event data never travels unencrypted.
Biometric Privacy
We do not store raw face images for recognition. We convert faces into non-reversible 512-dimensional numerical vectors (embeddings). It is impossible to recreate the original photo from this data.
User Control
You own your data. Our platform provides granular controls to delete individual invitees or wipe entire events permanently, ensuring compliance with "Right to be Forgotten" requests.
Secure Infrastructure
Hosted on secure cloud infrastructure with regular security audits, automated backups, and strict access controls.
Compliance Guide
If you are hosting events in jurisdictions with biometric privacy laws (like Illinois BIPA, Texas CUBI, or GDPR in Europe), FaceInvite helps you comply:
- Consent: Always obtain written or digital consent from attendees before they upload their photo.
- Policy: Publish a retention policy (our platform allows you to link your own policy).
- Deletion: Use our "Delete Event" feature immediately after your event concludes to purge biometric data.